Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 03:36
Behavioral task
behavioral1
Sample
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe
Resource
win7-20240508-en
General
-
Target
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe
-
Size
968KB
-
MD5
c82a3da38e0debb9a378f1dc3777c33e
-
SHA1
aa6c7428f186d9498ca705b9c0d58736757a632e
-
SHA256
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3
-
SHA512
628cda89421e6327ba5a274d28386faf0b56c35f52dc237bbc310aef2a20ec5d5b7fb1bc4f22d610981ce5c6a9733bfc16568f473eb23b43094637b1db969cc1
-
SSDEEP
24576:FmtpMM4Qevjz8fSEhQKQWxUg9RzZtNMiTRqfLj:EpviIOYxUQRzZtNyj
Malware Config
Extracted
quasar
2.1.0.0
Windows Security
37.0.14.203:7812
VNM_MUTEX_2r4e6JnVsMyKl6Aod6
-
encryption_key
7m3r0pz1Q0GDX0J3KjKp
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Updated
-
subdirectory
Win32
Signatures
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2364-1-0x00000000003C0000-0x000000000044C000-memory.dmp disable_win_def behavioral1/files/0x0036000000016c67-5.dat disable_win_def behavioral1/memory/2624-10-0x0000000000E70000-0x0000000000EFC000-memory.dmp disable_win_def behavioral1/memory/3028-82-0x0000000000F40000-0x0000000000FCC000-memory.dmp disable_win_def -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe -
Quasar payload 4 IoCs
resource yara_rule behavioral1/memory/2364-1-0x00000000003C0000-0x000000000044C000-memory.dmp family_quasar behavioral1/files/0x0036000000016c67-5.dat family_quasar behavioral1/memory/2624-10-0x0000000000E70000-0x0000000000EFC000-memory.dmp family_quasar behavioral1/memory/3028-82-0x0000000000F40000-0x0000000000FCC000-memory.dmp family_quasar -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat family_asyncrat -
Detects Windows executables referencing non-Windows User-Agents 4 IoCs
resource yara_rule behavioral1/memory/2364-1-0x00000000003C0000-0x000000000044C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2624-10-0x0000000000E70000-0x0000000000EFC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/3028-82-0x0000000000F40000-0x0000000000FCC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 4 IoCs
resource yara_rule behavioral1/memory/2364-1-0x00000000003C0000-0x000000000044C000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2624-10-0x0000000000E70000-0x0000000000EFC000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/3028-82-0x0000000000F40000-0x0000000000FCC000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Detects executables containing URLs to raw contents of a Github gist 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 4 IoCs
resource yara_rule behavioral1/memory/2364-1-0x00000000003C0000-0x000000000044C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2624-10-0x0000000000E70000-0x0000000000EFC000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/3028-82-0x0000000000F40000-0x0000000000FCC000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 4 IoCs
resource yara_rule behavioral1/memory/2364-1-0x00000000003C0000-0x000000000044C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2624-10-0x0000000000E70000-0x0000000000EFC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3028-82-0x0000000000F40000-0x0000000000FCC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables referencing Discord tokens regular expressions 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_Discord_Regex -
Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing credit card regular expressions 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Detects executables referencing many VPN software clients. Observed in infosteslers 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_References_VPN -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables using Telegram Chat Bot 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_TelegramChatBot -
Detects executables with interest in wireless interface using netsh 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon -
Detects file containing reversed ASEP Autorun registry keys 1 IoCs
resource yara_rule behavioral1/files/0x0036000000016c67-5.dat INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Executes dropped EXE 1 IoCs
pid Process 2624 Windows Security.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2736 schtasks.exe 2460 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2036 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2472 powershell.exe 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 3028 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Token: SeDebugPrivilege 2624 Windows Security.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 2624 Windows Security.exe Token: SeDebugPrivilege 3028 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 Windows Security.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2736 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 29 PID 2364 wrote to memory of 2736 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 29 PID 2364 wrote to memory of 2736 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 29 PID 2364 wrote to memory of 2736 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 29 PID 2364 wrote to memory of 2624 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 31 PID 2364 wrote to memory of 2624 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 31 PID 2364 wrote to memory of 2624 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 31 PID 2364 wrote to memory of 2624 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 31 PID 2364 wrote to memory of 2472 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 32 PID 2364 wrote to memory of 2472 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 32 PID 2364 wrote to memory of 2472 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 32 PID 2364 wrote to memory of 2472 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 32 PID 2624 wrote to memory of 2460 2624 Windows Security.exe 34 PID 2624 wrote to memory of 2460 2624 Windows Security.exe 34 PID 2624 wrote to memory of 2460 2624 Windows Security.exe 34 PID 2624 wrote to memory of 2460 2624 Windows Security.exe 34 PID 2364 wrote to memory of 756 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 36 PID 2364 wrote to memory of 756 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 36 PID 2364 wrote to memory of 756 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 36 PID 2364 wrote to memory of 756 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 36 PID 756 wrote to memory of 544 756 cmd.exe 38 PID 756 wrote to memory of 544 756 cmd.exe 38 PID 756 wrote to memory of 544 756 cmd.exe 38 PID 756 wrote to memory of 544 756 cmd.exe 38 PID 2364 wrote to memory of 1048 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 39 PID 2364 wrote to memory of 1048 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 39 PID 2364 wrote to memory of 1048 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 39 PID 2364 wrote to memory of 1048 2364 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 39 PID 1048 wrote to memory of 3040 1048 cmd.exe 41 PID 1048 wrote to memory of 3040 1048 cmd.exe 41 PID 1048 wrote to memory of 3040 1048 cmd.exe 41 PID 1048 wrote to memory of 3040 1048 cmd.exe 41 PID 1048 wrote to memory of 2036 1048 cmd.exe 42 PID 1048 wrote to memory of 2036 1048 cmd.exe 42 PID 1048 wrote to memory of 2036 1048 cmd.exe 42 PID 1048 wrote to memory of 2036 1048 cmd.exe 42 PID 1048 wrote to memory of 3028 1048 cmd.exe 43 PID 1048 wrote to memory of 3028 1048 cmd.exe 43 PID 1048 wrote to memory of 3028 1048 cmd.exe 43 PID 1048 wrote to memory of 3028 1048 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe"C:\Users\Admin\AppData\Local\Temp\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Updated" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2736
-
-
C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Updated" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2460
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zNr1WkQwCf4U.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3040
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe"C:\Users\Admin\AppData\Local\Temp\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
261B
MD559f9882725a27b767dcebb2d3beb6992
SHA169f1f73410403c60d293637b68e0a2bdb02bd245
SHA256718358cf36d4f33e0c31c107210bce9c7942a0501a88606e910acf2232385120
SHA51203ff4976968566f63bc88fc93b8daf7cf60e99a44c4703eadd3dff0cc2c3dacb72aa4a8a0a20d91f0f3377cb1b8d75a1670b8fee3d3b849fb0936f79a1aafc56
-
Filesize
968KB
MD5c82a3da38e0debb9a378f1dc3777c33e
SHA1aa6c7428f186d9498ca705b9c0d58736757a632e
SHA256dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3
SHA512628cda89421e6327ba5a274d28386faf0b56c35f52dc237bbc310aef2a20ec5d5b7fb1bc4f22d610981ce5c6a9733bfc16568f473eb23b43094637b1db969cc1